Policing Major Events in Australia: A Private Security Model of Police Cooperation

2014 ◽  
pp. 105-114
Author(s):  
Rick Sarre
2019 ◽  
Vol 7 (2) ◽  
pp. 969-997 ◽  
Author(s):  
Uğur DEMİRCİ

The purpose of this study is to test whether there is a mediating effect of private security officers’ police cooperation perception on the relationship between job satisfaction and occupational commitment. The population of the study includes the private security officers working in Bursa. Random sampling is conducted in the study. As a result of the questionnaire, 702 data were found analyzable. In this study, the Job Satisfaction Scale developed by Weiss et al. (1967), the Occupational Commitment Scale developed by Meyer et al. (1993) and Private Security Police Cooperation Level Scale developed by the researcher were used. According to the result of the study, it was revealed that there is a positive relationship between job satisfaction and occupational commitment, and police cooperation perception partially mediates this relationship.


2018 ◽  
Vol 12 (2) ◽  
pp. 87-98 ◽  
Author(s):  
Daniel J. Kruger ◽  
Moritz Köster ◽  
Joseph L. Nedelec ◽  
Shannon F. Murphy

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document